๐Ÿ” CVE Alert

CVE-2025-38008

UNKNOWN 0.0

mm/page_alloc: fix race condition in unaccepted memory handling

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: mm/page_alloc: fix race condition in unaccepted memory handling The page allocator tracks the number of zones that have unaccepted memory using static_branch_enc/dec() and uses that static branch in hot paths to determine if it needs to deal with unaccepted memory. Borislav and Thomas pointed out that the tracking is racy: operations on static_branch are not serialized against adding/removing unaccepted pages to/from the zone. Sanity checks inside static_branch machinery detects it: WARNING: CPU: 0 PID: 10 at kernel/jump_label.c:276 __static_key_slow_dec_cpuslocked+0x8e/0xa0 The comment around the WARN() explains the problem: /* * Warn about the '-1' case though; since that means a * decrement is concurrent with a first (0->1) increment. IOW * people are trying to disable something that wasn't yet fully * enabled. This suggests an ordering problem on the user side. */ The effect of this static_branch optimization is only visible on microbenchmark. Instead of adding more complexity around it, remove it altogether.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jun 18, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
dcdfdd40fa82b6704d2841938e5c8ec3051eb0d6 < 98fdd2f612e949c652693f6df00442c81037776d dcdfdd40fa82b6704d2841938e5c8ec3051eb0d6 < 74953f93f47a45296cc2a3fd04e2a3202ff3fa53 dcdfdd40fa82b6704d2841938e5c8ec3051eb0d6 < 71dda1cb10702dc2859f00eb789b0502de2176a9 dcdfdd40fa82b6704d2841938e5c8ec3051eb0d6 < fefc075182275057ce607effaa3daa9e6e3bdc73
Linux / Linux
6.5

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/98fdd2f612e949c652693f6df00442c81037776d git.kernel.org: https://git.kernel.org/stable/c/74953f93f47a45296cc2a3fd04e2a3202ff3fa53 git.kernel.org: https://git.kernel.org/stable/c/71dda1cb10702dc2859f00eb789b0502de2176a9 git.kernel.org: https://git.kernel.org/stable/c/fefc075182275057ce607effaa3daa9e6e3bdc73